共 87 条
[1]
A Tripwire Grammar for Insider Threat Detection
[J].
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS,
2016,
:105-108
[2]
Al-Shehari Taher, 2014, International Journal of Computer Theory and Engineering, V6, P57, DOI 10.7763/IJCTE.2014.V6.837
[3]
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2018, 21 (04)
:1917-1931
[4]
Ali G, 2008, 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, P168
[6]
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:373-384
[7]
Empirical Detection Techniques of Insider Threat Incidents
[J].
IEEE ACCESS,
2020, 8
:78385-78402
[8]
A knowledge-base model for insider threat prediction
[J].
2007 IEEE INFORMATION ASSURANCE WORKSHOP,
2007,
:239-+
[9]
[Anonymous], 2009, P CONGRESO IBEROAMER
[10]
[Anonymous], 2008, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications